A theoretical model for electrons escaping a quantum well under the influence of an applied electric field is developed. Both the thermionic emission and tunneling components of the currents are calculated, taking into account the proper partitioning between the two currents. The group velocity for a nonuniform electron distribution within the quantum well, which is a function of position and energy, and the continuous energy dependence of the quantum well density of states is considered. A comparison between this model and previously reported experimental results are made which demonstrates excellent agreement 相似文献
In this paper, an algorithm is proposed for detection and joint estimation of parameters of multiple targets using rotating antenna array. This paper is sequel to our previous work addressing a two element antenna array only. Joint estimation of number of targets, the targets’ range, Doppler and their directions of arrivals is carried while the effects of antenna rotation are compensated for a multi element linear array. The effectiveness of the algorithm is verified by the simulation results carried out for an eight element array. The proposed algorithm is able to resolve targets with same range and Doppler. The computations of the proposed algorithm are calculated and comparison is also given with other algorithms.
The growth of the networks has difficult network management. Recently, a concept called software‐defined network (SDN) has been proposed to address this issue, which makes network management more adaptable. Control and forwarding planes are separated in SDN. The control plane is a centralized logical controller that controls the network. The forwarding plane that consists of transfer devices is responsible for transmitting packets. Because the network resources are limited, optimizing the use of resources in the networks is an important issue. Load balancing improves the balanced distribution of loads across multiple resources in order to maximize the reliability and network resources efficiency. SDN controllers can create an optimal load balancing compared to traditional networks because they have a network global view. The load‐balancing problem can be solved using many different nature‐inspired meta‐heuristic techniques because it has the NP‐complete nature. Hence, for solving load balancing problem in SDN, nature‐inspired meta‐heuristic techniques are important methods. However, to the best of our knowledge, there is not a survey or systematic review on studying these matters. Accordingly, in the area of the load balancing in the SDN, this paper reviews systematically the nature‐inspired meta‐heuristic techniques. Also, this study demonstrates advantages and disadvantages regarded of the chosen nature‐inspired meta‐heuristic techniques and considers their algorithms metrics. Moreover, to apply better load balancing techniques in the future, the important challenges of these techniques have been investigated. 相似文献
The mobile cloud computing (MCC) has enriched the quality of services that the clients access from remote cloud‐based servers. The growth in the number of wireless users for MCC has further augmented the requirement for a robust and efficient authenticated key agreement mechanism. Formerly, the users would access cloud services from various cloud‐based service providers and authenticate one another only after communicating with the trusted third party (TTP). This requirement for the clients to access the TTP during each mutual authentication session, in earlier schemes, contributes to the redundant latency overheads for the protocol. Recently, Tsai et al have presented a bilinear pairing based multi‐server authentication (MSA) protocol, to bypass the TTP, at least during mutual authentication. The scheme construction works fine, as far as the elimination of TTP involvement for authentication has been concerned. However, Tsai et al scheme has been found vulnerable to server spoofing attack and desynchronization attack, and lacks smart card‐based user verification, which renders the protocol inapt for practical implementation in different access networks. Hence, we have proposed an improved model designed with bilinear pairing operations, countering the identified threats as posed to Tsai scheme. Additionally, the proposed scheme is backed up by performance evaluation and formal security analysis. 相似文献
The next generation video surveillance systems are expected to face challenges in providing computation support for an unprecedented amount of video streams from multiple video cameras in a timely and scalable fashion. Cloud computing offers huge computation resources for large-scale storage and processing on demand, which are deemed suitable for video surveillance tasks. Cloud also provides quality of service guaranteed hardware and software solutions with the virtual machine (VM) technology using a utility-like service costing model. In cloud-based video surveillance context, the resource requests to handle video surveillance tasks are translated in the form of VM resource requests, which in turn are mapped to VM resource allocation referring to physical server resources hosting the VMs. Due to the nature of video surveillance tasks, these requests are highly time-constrained, heterogeneous and dynamic in nature. Hence, it is very challenging to actually manage the cloud resources from the perspective of VM resource allocation given the stringent requirements of video surveillance tasks. This paper proposes a computation model to efficiently manage cloud resources for surveillance tasks allocation. The proposed model works on optimizing the trade-off between average service waiting time and long-term service cost, and shows that long-term service cost is inversely proportional to high and balanced utilization of cloud resources. Experiments show that our approach provides a near-optimal solution for cloud resource management when handling the heterogeneous and unpredictable video surveillance tasks dynamically over next generation network. 相似文献
This paper presents a novel system simulation methodology based on the known Monte Carlo technique, used for reliability and failure mode analysis of complex and large systems. The presented approach, called “state-merging and assorted random-testing” (SMART), is particularly applicable to systems involving different types of clusters of identical components, and is ideally suited for simulation of huge memories and similar systems. Simulators based on this approach are insensitive to the number of system components, system reliability or the number of associated spares or standby units, and thus they afford an extremely small simulation time compared to the accelerated Monte Carlo simulation time. 相似文献
A two-stage thermocatalytic upgrading process using a novel catalyst was investigated to produce light olefins and liquid fuels from fuel oil. The upgraded oil from the first thermal stage demonstrated lower viscosity and higher crackability compared to the virgin feedstock. In the next step, the vapor-phase catalytic cracking of the upgraded fraction was implemented over a novel nanoporous composite catalyst, characterized by the XRD, FTIR, NH3- TPD, and N2 physisorption techniques. In total, more than 55?wt% of light olefins, particularly propylene (25.5?wt%) together with 25.4?wt% and 32.5?wt% of gasoline and diesel fuel were obtained in this process. 相似文献
The proper placement of visual sensors across a sensor field for covering targets with arbitrary location and orientation is a mission-critical decision in surveillance applications. The specifics of sensor deployment in these applications not only determine the maximum achievable coverage, but it also affects the quality of the target’s appearance in cameras for subsequent use in vision tasks. However, the inaccuracies inherent in localization techniques and the lack of knowledge regarding the target orientation render existing proposals insufficient for real-life scenarios. In this paper, we address both challenges. First, we extend the conventional point representation of targets with a circular model to account for full-angle coverage of targets with known location yet with unknown orientation from all directions. We then assume, in the absence of precise location information, a trajectory profile of targets could instead be generated through the importance sampling of the environment, indicating spots where the target is most likely located. This profile-based abstraction enables us to capture the uncertainty in target’s location by encircling every agglomeration of proximal samples within one cluster. Each cluster can then be viewed as a virtual macroscopic circular target for which we formulate the coverage problem in terms of a Binary Integer Programming (BIP) model. We have also taken into account the presence of obstruction in between multiple targets by calculating the angles of view of the sensors in an occlusion-dependant manner, effectively determining optimal placement for maximal instead of full-angle coverage. Evaluation results derived from our simulation experiments reveal that the proposed mechanism can effectively achieve high coverage accuracy with minimum number of deployed sensors. 相似文献